Cyber Security Publication
  • Advertise in Information security
  • Cybersecurity Hiring 2021
Home Authors Posts by CISOMAG

CISOMAG

3093 POSTS 0 COMMENTS

Identity Management Day: Here’s What Experts Have to Say

Research has pointed out that nearly 80% of organizations have faced some sort of security breach due to identity-related issues, even here nearly every...

Why Businesses are Investing in Data Privacy

Stories about data leaks from social media sites surface with alarming regularity these days. And it’s not just social media. Stock exchanges, credit card...

India’s Data Breach Saga Continues; Country’s Second Largest Stockbroker, Upstox, Hit!

The dust of the MobiKwik data breach was just beginning to settle as another data breach takes center stage. This time it is India’s...

“Security leaders must communicate consistently and with transparency to build trust”

In turbulent times organizations need to focus on business priorities and restructure processes and teams. How should security leaders set their priorities and how...

U.K. NCSC Urges Brits to Avoid Pet’s Names as Passwords

One cannot ignore the importance of a strong password while improving security online. Using hard-to-guess passwords or passphrases provide optimum security to your devices...

Another Israeli Cyber Sabotage Attempt on Iran’s Natanz Nuclear Facility?

On April 11, 2021, Iran’s Natanz nuclear power plant reportedly faced yet another “sabotage” attempt when a fire caused by an explosion severely damaged...

Over 45 Mn Egyptians Affected in Recent Facebook Data Leak

A few days back, security researcher Alon Gal revealed that the personal details of nearly 533 million Facebook users from 106 countries were allegedly exposed and kept on...

Hackers Have an Appetite for Indian Power Companies

Tearing a page from the bad actor’s handbook was a recent China nation-state attack against 10 Indian power sector companies. Tensions between China and...

Top 10 Neglected Data Security Best Practices

Ensuring data security becomes harder every day. Firstly, sensitive data is often spread across on-premises and cloud-based storage locations, which makes it more difficult...

Crucial Cybersecurity Assessment Steps Before Merger or Acquisition

Technology and data are at the heart of almost every business. Cybersecurity should be a concern at the same priority level as legal and...

MOST POPULAR

RECENT POSTS